article thumbnail

Hacking Grindr Accounts with Copy and Paste

Troy Hunt

The vulnerability allow an attacker to hijack any account. On a surface of it, things looked bad: complete account takeover with a very trivial attack. All I needed was for Scott to create an account and let me know the email address he used which in this case, was test@scotthelme.co.uk. Full account takeover.

article thumbnail

Weekly Update 429

Troy Hunt

I post lots of pics to my Facebook account , and if none of that is interesting, here's this week's video on more infosec-related topics: References Sponsored by:  Cyberattacks are guaranteed. Is your recovery? Protect your data in the cloud. Join Rubrik’s Cloud Resilience Summit.

InfoSec 237
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Peerlyst shares infosec intel; recognizes Last Watchdog as a top cybersecurity influencer

The Last Watchdog

Started by infosec professionals, Peerlyst takes the characteristics of B2B communications we’ve become accustomed to on Twitter and LinkedIn and directs it toward cybersecurity. You can do so by submitting an email address or log in with your LinkedIn account. I’m honored to be included. It’s easy to participate on Peerlyst.

InfoSec 37
article thumbnail

Thinking About the Future of InfoSec (v2022)

Daniel Miessler

The ideas will cover multiple aspects of InfoSec, from organizational structure to technology. At the highest level, I think the big change to InfoSec will be a loss of magic compared to now. HT to Jeremiah Grossman to also being very early to seeing the role of insurance in InfoSec. Accounting is repeatable. The arcane.

InfoSec 180
article thumbnail

CIA Dirty Laundry Aired

Schneier on Security

And during the trial, a lot of shoddy security and sysadmin practices are coming out : All this raises a question, though: just how bad is the CIA's security that it wasn't able to keep Schulte out, even accounting for the fact that he is a hacking and computer specialist? And the answer is: absolutely terrible. Their justification?

InfoSec 277
article thumbnail

Your Work Email Address is Your Work's Email Address

Troy Hunt

Not just infosec headlines or tech headlines, but the headlines of major consumer media the likes my mum and dad would read. Let's start with a poll: At your place of work, does your employer have the right to access the contents of your corporate email account if necessary? Have an affair."

article thumbnail

Account Takeover Risks of Small Businesses: How to Avoid Them

CTOVision Cybersecurity

Read Ben Hartwig explain how small and medium businesses can avoid account takeover risks on Infosec Magazine: Account takeover seeks to infiltrate an existing account and use them for the […].